From a cybersecurity standpoint, the year of 2014 has been saturated with brand-new trends and
innovative approaches to the old ones. Further rapid rise of cloud computing, the growth of social media popularity, the increment of smart phones’ share on the cyber arena, enhanced techniques for online identity protection and, on the other hand, the increasing sophistication of malware attacks – these factors have substantially influenced the way the security software industry should respond to these challenges so as not to lag behind. In this constantly evolving environment, it certainly matters what computer programs to use for proper protection. Experts working on the Privacy PC project have come up with a rating of the software suites that will meet most demanding users’ requirements in terms of reliable defenses in 2015.
Privacy PC is an ambitious initiative aimed at keeping track of computer security, data protection and user privacy issues. Since its launch back in 2003, the project has been continuously testing security software in the prevalent categories according to a robust set of evaluation criteria. Other areas of the team’s expertise include incident response, cyber warfare, social engineering, virus cleanup, data encryption, to name a few.
Getting back to the rating, here is what David Balaban, Privacy PC’s Chief Editor, has to say:
Over the course of the year, we have been testing security software representing all the major niches. Owing to an extensive list of benchmarking parameters, the verdicts on what is where on the scale of overall efficiency and usability have become obvious.The Gold, Silver, Bronze and Editor’s Choice award winners are listed for the following software clusters: antivirus, Internet security, antimalware, antispyware, mobile security, free antivirus, Internet privacy, encryption, and password management. Download links and brief highlights about each product are provided in one place. Users can also navigate to the respective full review pages for all programs directly from the evaluation page. Last but not least, the impartiality of the rating is attained owing to a clear-cut testing algorithm, where applications are assessed in terms of usability, feature set, efficiency and support. The sum of grades by the above criteria is what ultimately determines the total score.
Keeping one’s cyber life intact is essential these days. Security software ratings like this help users stay on the safe side by separating the great products from the mediocre ones.